CMGT582 Wk2 IA Essay

Information Security at the United States Department of Defense
Iram Betancourt
CMGT/582
October 29, 2012
Cynthia McGathey

Information Security at the United States Department of Defense

The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”
A Security Technical Implementation Guide (STIG) is a systematized secured installation and maintenance approach to computer hardware and software. DISA which designs configuration documents in support of DoD, had first coined the phrase under instructions by DoD.
This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.
A desktop computer configuration is an example where STIGs would be beneficial. Most OS (operating systems) are not inherently secure. This leaves them open to criminals (i.e., and computer hackers and personal identity thieves). STIG’s explain how to minimize network-based attacks, and preventing system access when the attacker is present at the device. STIGs also describe maintenance processes (for example: vulnerability patching and software updates).
Developed STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain name servers and switches.
STIGs contain technical procedures to "lock down" information systems that would become susceptible to a malicious attack. DISA’s Field Security Operations (FSO) has been performing a an important function in enhancing DoD's security systems posture by implementing Security Technical Implementation Guides (STIGs) since 1998.
Hacktivism
Hacktivism (a compound of hack and activism) is the use of computers and computer networks as a means of protesting to promote political ends. It’s not just e-commerce and media that are potential victims of hacktivism. Governments from all over the world are beefing up their efforts to avoid being the victims of political and terrorist groups who want to steal state secrets and cash, and bring down internal networks. Every day the U.S. and others are the victims of targeted attacks from cyber terrorist groups—including Al Qaeda. DoD has begun taking a proactive approach to cyber security, recognizing that hacktivists are no longer low-level hackers breaking in “for fun,” and are now serious, high-level operatives like Anonymous, with deep-pockets, advanced skills and little concern for consequences.
The most important step any agency or business can take to avoid being the victim of a hacktivist is to take a proactive approach to security. Many wait until there is a problem—the site is under a DDoS attack, or a security breach has been identified—to react.
Thwarting hacktivists attacks requires diligence beforehand to fend off the persistent attackers. For example, developing security protocols for using the cloud and properly vetting potential vendors and other users can help prevent security vulnerabilities. There need to be strict controls on BYOD (bring your own device) policies and use of social media, as well as network level protocols such as advanced firewalls and encryption. Most importantly, organizations need to recognize that the ever-changing landscape of hacktivism requires an ongoing…

Related Documents: CMGT582 Wk2 IA Essay

Both articles talks about compensation pay. The first article talks about six dangerous myths employer go by and this leads to unstable and or unstable work equality. Myth: 1) Employers mistake Labor rates to be the same as labor cost 2) They believe they can lower labor costs by cutting labor rates which would decrease productivity. 3) Labor costs constitute a significant proportion of total costs. 4) Low labor costs are a potent and sustainable competitive weapon. 5) Individual incentive pay…

success!’ – stick to the facts
Make sure you:
The title of the practical
the date the practical was conducted
Include your name (and IBO number for 2014)
include page numbers
IB CHEMISTRY
IA CRITERIA CHECK LIST
This check list should be read in conjunction with IA criterion and clarification of IA criteria documents provided.
CRITERION OF DESIGN
DESIGN ASPECT ONE: Define problem and select variables
Have you formulated a clear and focused problem or research question? This should be an…

This design was an experiment based on memory, which allowed for the relationship between control and the experiment group to be determined. This design collected information that collaborated on concluding whether memorizing a set of words or data by narrative method also know as the independent variable would yield better results (dependant variable) rather than taking a set of words and memorizing them randomly or off the top of their heads (control group). In order to avoid demand characteristics…

DIRECTIONS FOR THE PLAN OF THE INVESTIGATION
IB Requirements:
A Plan of the investigation
This is a relatively brief but important section. A sharply focused question and a clearly structured plan will be more likely to produce a successful investigation.
.
Students should:
• State the topic of the investigation, which should be formulated as a research question. It could be useful to provide a rationale for the choice of the selected topic for investigation (Why is this question worth investigating…

IA 160 Sec 2
Professor Dona
Bonus Activity
In this lecture, we know three designers who are Maya Lin, I.M Pei and Douglas Cardinal. These designers’ styles are different, but they show their thinking very well at their works. Maya Lin is a designer from Vietnam. One of the famous works from her is the veteran’s memorial. The memorial is the experiences of sight, sound, and touch. You can see the all black rock of this work, you can hear the quiet sounds in this work, and you can touch the water…

Comparative Summary
HCS 577
June 17, 2013
Comparative Summary
Health care finance is a term used to describe the accounting and financial management of a health care organization as well as the principles and practices used in any health care organization, and meant to ensure the financial security and interests in the organization. There are three types of financial environments in the health care world. There is the for-profit financial environment, not-for-profit financial environment…

Families Research: Stepfamilies
Nicole McCarty-Carter
BSHS/371
December 22, 2014
Ms. Dana Serrata
Families Research: Stepfamilies
A stepfamily is created at any time one or both adults in a new couple take children from a previous relationship (Bray, PhD, 2014). Moreover, if stepfamilies seem to be like first-time families on the outside, all are quite complicated on the interior. The first step toward building a healthy stepfamily is understanding the differences between stepfamilies in addition…

Federal Reserve
Victoria Barry
ECO 372
May 4, 2015
Godwin Quashigah
Federal Reserve
The central Bank of the United States is known as the Federal Reserve. It is characterized by a unique structure which includes twelve district banks. These bank districts all include major cities. Alaska and Hawaii are included within the twelfth district. A federal government agency who’s Board of Governors is located in Washington D.C., which was created in 1913, after a series of financial scares. Three…

Words 933 - Pages 4

* Test names and other trademarks are the property of the respective trademark holders. None of the trademark holders are affiliated with this website.